getcertified4sure.com

Secrets to ccent 100 105




Your success in Cisco 100 105 exam is our sole target and we develop all our ccent ccna icnd1 100 105 braindumps in a way that facilitates the attainment of this target. Not only is our 100 105 icnd1 v3 0 study material the best you can find, it is also the most detailed and the most updated. ccent ccna icnd1 100 105 Practice Exams for Cisco CCENT ccent 100 105 are written to the highest standards of technical accuracy.

P.S. Pinpoint 100-105 practice exam are available on Google Drive, GET MORE: https://drive.google.com/open?id=1bsb-sFsEjKH4qxNCkR_EoI2fGRgBevmQ


New Cisco 100-105 Exam Dumps Collection (Question 1 - Question 10)

Q1. The ip helper-address command does what?

A. assigns an IP address to a host

B. resolves an IP address from a DNS server

C. relays a DHCP request across networks

D. resolves an IP address overlapping issue

Answer: C

Explanation:

http://cisconet.com/tcpip/dhcp/107-how-to-use-ip-helper-address-to-connect-remote-dhcp- server.html

When the DHCP client sends the DHCP request packet, it doesnu2021t have an IP address. So it uses the all-zeroes address, 0.0.0.0, as the IP source address. And it doesnu2021t know how to reach the DHCP server, so it uses a general broadcast address, 255.255.255.255, for the destination.

So the router must replace the source address with its own IP address, for the interface that received the request. And it replaces the destination address with the address specified in the ip helper-address command. The client deviceu2021s MAC address is included in the payload of the original DHCP request packet, so the router doesnu2021t need to do anything to ensure that the server receives this information. The router then relays the DHCP request to the DHCP server.



Q2. Which of the following statements are TRUE regarding Cisco access lists? (Choose two.)

A. In an inbound access list, packets are filtered as they enter an interface.

B. In an inbound access list, packets are filtered before they exit an interface.

C. Extended access lists are used to filter protocol-specific packets.

D. You must specify a deny statement at the end of each access list to filter unwanted traffic.

E. When a line is added to an existing access list, it is inserted at the beginning of the access list.

Answer: A,C

Explanation:

In an inbound access list, packets are filtered as they enter an interface. Extended access lists are used to filter protocol specific packets. Access lists can be used in a variety of situations when the router needs to be given guidelines for decision-making. These situations include:

Filtering traffic as it passes through the router To control access to the VTY lines (Telnet)

To identify "interesting" traffic to invoke Demand Dial Routing (DDR) calls To filter and control routing updates from one router to another

There are two types of access lists, standard and extended. Standard access lists are applied as close to the destination as possible (outbound), and can only base their filtering criteria on the source IP address. The number used while creating an access list specifies the type of access list created. The range used for standard access lists is 1 to 99 and 1300 to 1999. Extended access lists are applied as close to the source as possible (inbound), and can base their filtering criteria on the source or destination IP address, or on the specific protocol being used. The range used for extended access lists is 100 to 199 and 2000 to 2699.

Other features of access lists include:

Inbound access lists are processed before the packet is routed.

Outbound access lists are processed after the packet has been routed to an exit interface. An "implicit deny" is at the bottom of every access list, which means that if a packet has not matched any preceding access list condition, it will be filtered (dropped).

Access lists require at least one permit statement, or all packets will be filtered (dropped). One access list may be configured per direction for each Layer 3 protocol configured on an interface The option stating that in an inbound access list, packets are filtered before they exit an interface is incorrect.

Packets are filtered as they exit an interface when using an outbound access list.

The option stating that a deny statement must be specified at the end of each access list in order to filter unwanted traffic is incorrect. There is an implicit deny at the bottom of every access list.

When a line is added to an existing access list, it is not inserted at the beginning of the access list. It is inserted at the end. This should be taken into consideration. For example, given the following access list, executing the command access-list 110 deny tcp 192.168.5.0 0.0.0.255 any eq www would have NO effect on the packets being filtered because it would be inserted at the end of the list, AFTER the line that allows all traffic.

access-list 110 permit ip host 192.168.5.1 any

access-list 110 deny icmp 192.168.5.0 0.0.0.255 any echo access-list 110 permit any any



Q3. Which two of these statements are true of IPv6 address representation? (Choose two.)

A. There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.

B. A single interface may be assigned multiple IPv6 addresses of any type.

C. Every IPv6 interface contains at least one loopback address.

D. The first 64 bits represent the dynamically created interface ID.

E. Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.

Answer: B,C

Explanation:

A single interface may be assigned multiple addresses of any type (unicast, anycast, multicast).

Every IPv6-enabled interface must contain at least one loopback and one link-local address.

Optionally, every interface can have multiple unique local and global addresses. IPv6 host addresses can be assigned in multiple ways:

Static configuration Stateless autoconfiguration DHCPv6

When IPv6 is used over Ethernet networks, the Ethernet MAC address can be used to generate the 64-bit interface ID for the host. This is called the EUI-64 address.

Since MAC addresses use 48 bits, additional bits must be inserted to fill the 64 bits required.

Reference: http://www.cisco.com/en/US/technologies/tk648/tk872/technologies_white_paper0900aecd 8026003d.pdf



Q4. Which option is a valid IPv6 address?

A. 2001:0000:130F::099a::12a

B. 2002:7654:A1AD:61:81AF:CCC1

C. FEC0:ABCD:WXYZ:0067::2A4

D. 2004:1:25A4:886F::1

Answer: D

Explanation:

IPv6 Address Notation

IPv6 addresses are denoted by eight groups of hexadecimal quartets separated by colons in between them.

Following is an example of a valid IPv6 address: 2001:cdba:0000:0000:0000:0000:3257:9652

Any four-digit group of zeroes within an IPv6 address may be reduced to a single zero or altogether omitted.

Therefore, the following IPv6 addresses are similar and equally valid: 2001:cdba:0000:0000:0000:0000:3257:9652

2001:cdba:0:0:0:0:3257:9652

2001:cdba::3257:9652

Reference: http://www.ipv6.com/articles/general/IPv6-Addressing.htm



Q5. Why do large OSPF networks use a hierarchical design? (Choose three.)

A. to decrease latency by increasing bandwidth

B. to reduce routing overhead

C. to speed up convergence

D. to confine network instability to single areas of the network

E. to reduce the complexity of router configuration

F. to lower costs by replacing routers with distribution layer switches

Answer: B,C,D

Explanation:

OSPF implements a two-tier hierarchical routing model that uses a core or backbone tier known as area zero (0). Attached to that backbone via area border routers (ABRs) are a number of secondary tier areas.

The hierarchical approach is used to achieve the following:

u2711 Rapid convergence because of link and/or switch failures

u2711 Deterministic traffic recovery

u2711 Scalable and manageable routing hierarchy, reduced routing overhead.



Q6. The network administrator is using a Windows PC application that is called putty.exe for remote communication to a switch for network troubleshooting. Which two protocols could be used during this communication? (Choose two.)

A. SNMP

B. HTTP

C. Telnet

D. RMON

E. SSH

Answer: C,E

Explanation:

PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, and is used to connect to Cisco and other networking devices using SSH or Telnet.



Q7. Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowledgments?

A. Physical

B. Data-link

C. Transport

D. Network

Answer: C



Q8. What is the OSPF default frequency, in seconds, at which a Cisco router sends hello packets on a multi-access network?

A. 10

B. 40

C. 30

D. 20

Answer: A

Explanation:

On broadcast multiacess and point-to-point links, the default is 10 seconds. On NBMA, the default is 30 seconds.



Q9. Which parameter or parameters are used to calculate OSPF cost in Cisco routers?

A. Bandwidth

B. Bandwidth and Delay

C. Bandwidth, Delay, and MTU

D. Bandwidth, MTU, Reliability, Delay, and Load

Answer: A

Explanation:

The well-known formula to calculate OSPF cost is Cost = 108/ Bandwidth



Q10. Refer to the exhibit.

HostX is transferring a file to the FTP server. Point A represents the frame as it goes toward the Toronto router. What will the Layer 2 destination address be at this point?

A. abcd.1123.0045

B. 192.168.7.17

C. aabb.5555.2222

D. 192.168.1.1

E. abcd.2246.0035

Answer: E

Explanation:

For packets destined to a host on another IP network, the destination MAC address will be the LAN interface of the router. Since the FTP server lies on a different network, the host will know to send the frame to its default gateway, which is Toronto.



Recommend!! Get the Pinpoint 100-105 dumps in VCE and PDF From Certleader, Welcome to download: https://www.certleader.com/100-105-dumps.html (New 347 Q&As Version)